Virtualization Strategies: Virtualization Strategies:

46
Virtualization Strategies: Virtualization Strategies: Virtual Technology Real Results Virtual Technology Real Results Bryan Von Axelson Bryan Von Axelson IT Pro Evangelist IT Pro Evangelist Microsoft Microsoft

Transcript of Virtualization Strategies: Virtualization Strategies:

Page 1: Virtualization Strategies: Virtualization Strategies:

Virtualization Strategies:Virtualization Strategies:Virtual Technology Real ResultsVirtual Technology Real Results

Bryan Von AxelsonBryan Von AxelsonIT Pro EvangelistIT Pro Evangelist

MicrosoftMicrosoft

Page 2: Virtualization Strategies: Virtualization Strategies:

What this session covers

�� IT ChallengesIT Challenges�� Virtualization Market TrendsVirtualization Market Trends�� Scenarios for Server VirtualizationScenarios for Server Virtualization�� Scenarios for Application VirtualizationScenarios for Application Virtualization�� Planning for Hardware VirtualizationPlanning for Hardware Virtualization

Page 3: Virtualization Strategies: Virtualization Strategies:

IT ChallengesIT Challenges

Page 4: Virtualization Strategies: Virtualization Strategies:

IT Challenges

�� Simplify ManagementSimplify Management–– Information and organizational growthInformation and organizational growth–– Patching and software updatesPatching and software updates–– Increase availabilityIncrease availability–– System deploymentSystem deployment–– Regulatory complianceRegulatory compliance

�� Reduce CostsReduce Costs–– Server sprawl Server sprawl –– System and application maintenanceSystem and application maintenance–– Infrastructure costsInfrastructure costs

�� Increase SecurityIncrease Security–– AV & Spam AV & Spam –– Threat protectionThreat protection

Page 5: Virtualization Strategies: Virtualization Strategies:

Virtualization Benefits

�� Reduces administrative effortsReduces administrative efforts–– Lowers operational costsLowers operational costs

•• Fewer servers to manageFewer servers to manage

–– Speeds deploymentSpeeds deployment•• Now 1Now 1--6 weeks (requisition, setup, software, test)6 weeks (requisition, setup, software, test)•• Virtual reduces this to hoursVirtual reduces this to hours

�� Reduced hardware and infrastructure costsReduced hardware and infrastructure costs�� Improves resource utilizationImproves resource utilization�� Increases availabilityIncreases availability�� Tools to enhance securityTools to enhance security

Page 6: Virtualization Strategies: Virtualization Strategies:

Virtualization TrendsVirtualization Trends

Page 7: Virtualization Strategies: Virtualization Strategies:

Virtual Server Growth

�� Tremendous growth Tremendous growth in virtual serversin virtual servers

�� 1M servers by 20091M servers by 2009�� WinHecWinHec

–– Bob MugliaBob Muglia–– Virtualization will be Virtualization will be

the normthe norm–– All workloads will be All workloads will be

virtualized in 2virtualized in 2--4 years4 years

IDC Server Virtualization September 2005

Page 8: Virtualization Strategies: Virtualization Strategies:

Virtualization Market Growth

�� 5 fold growth in 5 fold growth in virtualization virtualization market placemarket place

�� More expensive More expensive serversservers

�� Virtualization Virtualization managementmanagement

IDC Server Virtualization September 2005

Page 9: Virtualization Strategies: Virtualization Strategies:

Server Virtualization Scenarios

�� Server consolidationServer consolidation�� Multiple OS & application supportMultiple OS & application support�� Lab and deployment testingLab and deployment testing�� TrainingTraining�� Help deskHelp desk�� Disaster recoveryDisaster recovery�� Application isolationApplication isolation�� Intrusion detectionIntrusion detection�� SecuritySecurity

Page 10: Virtualization Strategies: Virtualization Strategies:

Server Sprawl

�� New application = new serverNew application = new server

���������

���������

���������

���� �

���� �

����������

����������

����������

����������

����������

����������

����������

����������

Page 11: Virtualization Strategies: Virtualization Strategies:

Problems Server Sprawl

�� HardwareHardware–– Increased hardware acquisition costsIncreased hardware acquisition costs–– Increased infrastructure requirementsIncreased infrastructure requirements–– Increased hardware maintenance costsIncreased hardware maintenance costs–– Increased hardware replacement costsIncreased hardware replacement costs

Page 12: Virtualization Strategies: Virtualization Strategies:

Problems of Server Sprawl

�� AdministrationAdministration–– Patch managementPatch management–– Backup and recovery Backup and recovery –– Server management and troubleshootingServer management and troubleshooting

Page 13: Virtualization Strategies: Virtualization Strategies:

Servers Deployed

18%

6%

6%

9%

13%

26%

13%

8%

1%

0% 10% 20% 30%

Don't know

5,000 or more

1,000 - 4,999

500 - 999

250 - 499

100 - 249

26 - 99

10 - 25

Less than 10

IDG Server Consolidation Research July 2006

Page 14: Virtualization Strategies: Virtualization Strategies:

Multiple Vendor Support

9%

2%

2%

1%

1%

2%

4%

13%

14%

29%

17%

6%

0% 10% 20% 30%

Don't know

Over 25 vendors

10 - 25

9

8

7

6

5

4

3

2

1 vendor

IDG Server Consolidation Research July 2006

Page 15: Virtualization Strategies: Virtualization Strategies:

Biggest Challenges

2%

6%

25%

27%

42%

44%

60%

63%

0% 10% 20% 30% 40% 50% 60% 70%

Don't know

Other

Downtime

Interoperability

Server sprawl

Maintenance costs

Resource utilization

Patch management

IDG Server Consolidation Research July 2006

Page 16: Virtualization Strategies: Virtualization Strategies:

Server Consolidation Strategy

Don’tknow2%

No28%Yes

70%

IDG Server Consolidation Research July 2006

Page 17: Virtualization Strategies: Virtualization Strategies:

Server Consolidation

�� Increase hardware Increase hardware utilizationutilization

�� Reduced costsReduced costs–– Fewer systemsFewer systems–– Less powerLess power–– Less coolingLess cooling–– Lower IT resourcesLower IT resources

�� Reduced InfrastructureReduced Infrastructure–– Fewer racksFewer racks–– Fewer switchesFewer switches

Page 18: Virtualization Strategies: Virtualization Strategies:

Multiple O/S & Applications

�� Linux InteroperabilityLinux Interoperability–– Shared hardwareShared hardware

�� Legacy OS SupportLegacy OS Support–– Windows NT 4.0Windows NT 4.0–– Limited support for Limited support for

modern hardwaremodern hardware

�� ISV ApplicationsISV Applications–– Restricted platform Restricted platform

supportsupport

Page 19: Virtualization Strategies: Virtualization Strategies:

OS Support

32%

24%21%

14%

3%6%

0%

10%

20%

30%

40%

5 or more 4 3 2 1 Don't know

IDG Server Consolidation Research July 2006

Page 20: Virtualization Strategies: Virtualization Strategies:

Types of OS Deployed

64%59%

1%

11%

28%32%

48%

72%

83%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Windowsserver

Unix (AIX,Solaris,SCO)

Linux (RedHat,

Caldera,Debian,SUSE)

Windows2000

Proprietary(S/390,OS/400,

VMS)

WindowsNT

NetWare Other Don't know

IDG Server Consolidation Research July 2006

Page 21: Virtualization Strategies: Virtualization Strategies:

Training

�� Present and reset training imagePresent and reset training image–– Just reset the VMJust reset the VM–– No need to reimage the systemsNo need to reimage the systems–– Network isolationNetwork isolation

Page 22: Virtualization Strategies: Virtualization Strategies:

Training

�� Microsoft Virtual LabsMicrosoft Virtual Labswww.microsoft.com/technet/traincert/virtuallab/default.mspxwww.microsoft.com/technet/traincert/virtuallab/default.mspx

�� Set of preconfigured environmentsSet of preconfigured environments�� Microsoft tools and current productsMicrosoft tools and current products

–– Vista, Exchange 2007, SQL Server 2005, Windows Vista, Exchange 2007, SQL Server 2005, Windows Server 2007, Office 2007Server 2007, Office 2007

Page 23: Virtualization Strategies: Virtualization Strategies:

Help Desk

�� Increase ability to represent multiple product Increase ability to represent multiple product environmentsenvironments

�� Reduced infrastructureReduced infrastructure–– Physical systemsPhysical systems–– Space requirementsSpace requirements–– PowerPower–– Cabling Cabling

�� Enhanced test system accessibilityEnhanced test system accessibility�� Ability to rollback test system stateAbility to rollback test system state

Page 24: Virtualization Strategies: Virtualization Strategies:

Lab and Deployment Testing

�� Build a test virtual network Build a test virtual network infrastructureinfrastructure

�� Duplicate physical modelDuplicate physical model–– Same domain structure and Same domain structure and

system namessystem names–– Virtual network clientsVirtual network clients

�� Reduced physical system Reduced physical system requirementsrequirements–– No need for 1No need for 1--1 physical 1 physical

systemssystems

�� Virtual networkingVirtual networking–– Connects virtual systemsConnects virtual systems–– Isolated from production Isolated from production

networknetwork

Page 25: Virtualization Strategies: Virtualization Strategies:

Lab and Deployment Testing

�� Use the virtual network to testUse the virtual network to test–– Active Directory, networking, policy changesActive Directory, networking, policy changes–– Patch testingPatch testing–– Application deploymentApplication deployment

�� Roll out change to production after successful Roll out change to production after successful tests in the virtual environment tests in the virtual environment

Page 26: Virtualization Strategies: Virtualization Strategies:

Demo: Virtual ServerDemo: Virtual Server

Using Undo DisksUsing Undo Disks

Page 27: Virtualization Strategies: Virtualization Strategies:

Disaster Recovery

�� Fewer servers to manage and recover/restoreFewer servers to manage and recover/restore–– Reduces costsReduces costs

�� Server VMs are hardware independentServer VMs are hardware independent–– Can be restored to other platforms Can be restored to other platforms –– No need to match primary site and secondary site No need to match primary site and secondary site

hardwarehardware

�� VMs are encapsulatedVMs are encapsulated–– FasterFaster–– Can be replicated between sitesCan be replicated between sites–– No need for bareNo need for bare--metal installsmetal installs

Page 28: Virtualization Strategies: Virtualization Strategies:

Disaster Recovery

�� PhysicalPhysical--toto--VM recoveryVM recovery–– Restore physical backup to running VMRestore physical backup to running VM–– Lower costs Lower costs –– no need for 1no need for 1--toto--1 physical servers1 physical servers

�� VMVM--toto--VM recovery VM recovery –– Protects against operating system/application failureProtects against operating system/application failure–– Recover failed VM on another server Recover failed VM on another server

Page 29: Virtualization Strategies: Virtualization Strategies:

High Availability for Hosts

Primary Site Recovery Site

Page 30: Virtualization Strategies: Virtualization Strategies:

Clustering

Host to HostGuest to Guest

Cluster storage

iSCSI connection

Cluster storage

SAN or iSCSI connection

Page 31: Virtualization Strategies: Virtualization Strategies:

Application Isolation

�� SandboxingSandboxing�� Use browser in VMUse browser in VM�� Isolated from hostIsolated from host�� Discard changes Discard changes

when finished when finished

Page 32: Virtualization Strategies: Virtualization Strategies:

Application Isolation

�� VMware Browser ApplianceVMware Browser Appliance–– VMPlayerVMPlayer–– Runs any VM (VMware or Microsoft)Runs any VM (VMware or Microsoft)

www.vmware.com/download/player/www.vmware.com/download/player/

–– Browser ApplianceBrowser Appliance•• Ubuntu 5.1 & FirefoxUbuntu 5.1 & Firefoxwww.vmware.com/vmtn/appliances/directory/browserapp.htmlwww.vmware.com/vmtn/appliances/directory/browserapp.html

–– Other Virtual AppliancesOther Virtual Appliances•• 300 Prebuilt Virtual Appliances300 Prebuilt Virtual Applianceswww.vmware.com/vmtn/appliances/directory/www.vmware.com/vmtn/appliances/directory/

Page 33: Virtualization Strategies: Virtualization Strategies:

Intrusion Detection

�� HoneypottingHoneypotting–– Create a Create a ““production look alikeproduction look alike””–– Logging sensors to record attack activityLogging sensors to record attack activity–– Microsoft HoneymonkeyMicrosoft Honeymonkeyhttp://research.microsoft.com/HoneyMonkey/http://research.microsoft.com/HoneyMonkey/–– VM Honeypots are recongnizableVM Honeypots are recongnizable

Page 34: Virtualization Strategies: Virtualization Strategies:

Security

�� Forensic AnalysisForensic Analysis�� Duplicate a compromised systemDuplicate a compromised system

–– P2V makes an exact working copyP2V makes an exact working copy–– Offsite analysisOffsite analysis

�� Snapshots Snapshots –– PointPoint--inin--time copiestime copies

Page 35: Virtualization Strategies: Virtualization Strategies:

Application Virtualization ScenariosApplication Virtualization Scenarios

Page 36: Virtualization Strategies: Virtualization Strategies:

Running Incompatible Applications

�� Different versions of Microsoft OfficeDifferent versions of Microsoft Office�� Running beta softwareRunning beta software�� Running multiple Java virtual machinesRunning multiple Java virtual machines

Page 37: Virtualization Strategies: Virtualization Strategies:

No Touch Application Deployment

�� SoftGridSoftGrid–– SoftGrid client is deployedSoftGrid client is deployed–– Application is sequenced Application is sequenced

•• Stored on application serverStored on application server

–– User is added to AD SoftGrid groupUser is added to AD SoftGrid group–– Application is streamed from server to clientApplication is streamed from server to client

•• Partial app streaming results in fast code deliveryPartial app streaming results in fast code delivery

–– AltirisAltiris•• AppStreamAppStream

Page 38: Virtualization Strategies: Virtualization Strategies:

Application Reliability

�� SoftGridSoftGrid–– Application ResetApplication Reset

•• Overwrites malfunctioning applicationsOverwrites malfunctioning applications

–– User controlledUser controlled–– Application restreamedApplication restreamed

�� AltrisAltris–– Layer ResetLayer Reset–– User controlledUser controlled–– Restores original layerRestores original layer

Page 39: Virtualization Strategies: Virtualization Strategies:

Demo: Application VirtualizationDemo: Application Virtualization

Page 40: Virtualization Strategies: Virtualization Strategies:

Hardware Virtualization TechnologyHardware Virtualization Technology

Page 41: Virtualization Strategies: Virtualization Strategies:

Hardware Virtualization

�� Why?Why?–– PerformancePerformance–– No direct virtualization for older x86 & x64No direct virtualization for older x86 & x64–– Virtual Machine Additions Virtual Machine Additions

•• Change the guest OS allowing the VM kernel mode to run on Change the guest OS allowing the VM kernel mode to run on the processorthe processor

–– Hardware VirtualizationHardware Virtualization•• Enables VM code to run on processor in virtualized modeEnables VM code to run on processor in virtualized mode•• No significant difference for VM AdditionsNo significant difference for VM Additions•• Big difference for unsupported operating systemsBig difference for unsupported operating systems

Page 42: Virtualization Strategies: Virtualization Strategies:

Windows Server 2007 Hypervisor

�� Hardware assisted Hardware assisted virtualizationvirtualization–– Intel Virtualization Technology Intel Virtualization Technology

(VT)(VT)–– AMD Virtualization Technology AMD Virtualization Technology

(AMD(AMD--V)V)

�� Windows Server 2007 Windows Server 2007 HypervisorHypervisor–– 180 days after RTM180 days after RTM

�� Compatible with MS VM Compatible with MS VM ImagesImages

�� Compatible with XENCompatible with XEN--enabled enabled LinuxLinux

Page 43: Virtualization Strategies: Virtualization Strategies:

Virtualization Gottcha’s

�� You still need licensesYou still need licenses–– OS & any CALsOS & any CALs–– Windows Server 2003 Datacenter R2 is the exceptionWindows Server 2003 Datacenter R2 is the exception

�� PerformancePerformance–– Shared hardware resourcesShared hardware resources–– VMM overheadVMM overhead

�� Can result in more server sprawlCan result in more server sprawl

Page 44: Virtualization Strategies: Virtualization Strategies:

Server Consolidation Resources

�� Mixed Workload Consolidation GuideMixed Workload Consolidation Guide�� www.microsoft.com/downloads/details.aspx?FamilyId=0F70695Ewww.microsoft.com/downloads/details.aspx?FamilyId=0F70695E--

5D0B5D0B--47814781--89668966--84BE43216F9E&displaylang=en84BE43216F9E&displaylang=en

�� Consolidating SQL ServerConsolidating SQL Server�� www.microsoft.com/technet/prodtechnol/sql/2000/deploy/32bitconsowww.microsoft.com/technet/prodtechnol/sql/2000/deploy/32bitconso

lidation.mspxlidation.mspx

�� Consolidating Domain ControllersConsolidating Domain Controllers�� www.microsoft.com/technet/itsolutions/ucs/ds/dmcnmgsa.mspxwww.microsoft.com/technet/itsolutions/ucs/ds/dmcnmgsa.mspx

�� Consolidating File and Print ServersConsolidating File and Print Servers�� http://www.microsoft.com/technet/itsolutions/ucs/fp/cmfp/cmfpwnthttp://www.microsoft.com/technet/itsolutions/ucs/fp/cmfp/cmfpwnt4.4.

mspxmspx

�� Consolidating WebConsolidating Web--based applicationsbased applications�� www.microsoft.com/windowsserversystem/overview/benefits/consoliwww.microsoft.com/windowsserversystem/overview/benefits/consoli

dation/bestpractices.mspxdation/bestpractices.mspx

Page 45: Virtualization Strategies: Virtualization Strategies:

Additional Resources

�� Test Lab VirtualizationTest Lab Virtualization–– wwwvmblog.com/archive/2006/06/13/773.aspxwwwvmblog.com/archive/2006/06/13/773.aspx

�� Disaster RecoveryDisaster Recovery–– VMwareVMware

•• http://www.vmware.com/solutions/continuity/disasterrecoveryhttp://www.vmware.com/solutions/continuity/disasterrecovery.html.html

–– VMware Clustering VMsVMware Clustering VMs•• http://www.vmware.com/support/esx25/doc/admin/esx25admihttp://www.vmware.com/support/esx25/doc/admin/esx25admi

n_cluster_setup_esx.htmln_cluster_setup_esx.html–– Microsoft White Paper on VS2005 R2 ClusteringMicrosoft White Paper on VS2005 R2 Clustering

•• http://www.microsoft.com/downloads/details.aspx?FamilyID=http://www.microsoft.com/downloads/details.aspx?FamilyID=09cc042b09cc042b--154f154f--4eba4eba--a548a548--89282d6eb1b3&displaylang=en89282d6eb1b3&displaylang=en

Page 46: Virtualization Strategies: Virtualization Strategies:

Thank You!Thank You!